Firewall setup and use

Forum Forums New users New Users and General Questions Firewall setup and use

  • This topic has 4 replies, 3 voices, and was last updated Oct 27-6:11 pm by anticapitalista.
Viewing 5 posts - 1 through 5 (of 5 total)
  • Author
    Posts
  • #28643
    Member
    greyowl

      I am wanting to use the ufw firewall and the Gufw gui.
      I have never used a firewall before.
      I have enabled it.
      With Gufw, I set Incoming to Deny and Outgoing to Allow.
      But, I don’t know what else I need to do to make it work effectively.

      Below is the status and present rules from the terminal:

      user@antix1:~
      $ sudo ufw status
      Status: active
      user@antix1:~
      $ sudo service ufw status
      [ ok all is running...done.
      user@antix1:~
      $ sudo iptables --list
      Chain INPUT (policy DROP)
      target     prot opt source               destination         
      ufw-before-logging-input  all  --  anywhere             anywhere            
      ufw-before-input  all  --  anywhere             anywhere            
      ufw-after-input  all  --  anywhere             anywhere            
      ufw-after-logging-input  all  --  anywhere             anywhere            
      ufw-reject-input  all  --  anywhere             anywhere            
      ufw-track-input  all  --  anywhere             anywhere            
      
      Chain FORWARD (policy DROP)
      target     prot opt source               destination         
      ufw-before-logging-forward  all  --  anywhere             anywhere            
      ufw-before-forward  all  --  anywhere             anywhere            
      ufw-after-forward  all  --  anywhere             anywhere            
      ufw-after-logging-forward  all  --  anywhere             anywhere            
      ufw-reject-forward  all  --  anywhere             anywhere            
      ufw-track-forward  all  --  anywhere             anywhere            
      
      Chain OUTPUT (policy ACCEPT)
      target     prot opt source               destination         
      ufw-before-logging-output  all  --  anywhere             anywhere            
      ufw-before-output  all  --  anywhere             anywhere            
      ufw-after-output  all  --  anywhere             anywhere            
      ufw-after-logging-output  all  --  anywhere             anywhere            
      ufw-reject-output  all  --  anywhere             anywhere            
      ufw-track-output  all  --  anywhere             anywhere            
      
      Chain ufw-after-forward (1 references)
      target     prot opt source               destination         
      
      Chain ufw-after-input (1 references)
      target     prot opt source               destination         
      ufw-skip-to-policy-input  udp  --  anywhere             anywhere             udp dpt:netbios-ns
      ufw-skip-to-policy-input  udp  --  anywhere             anywhere             udp dpt:netbios-dgm
      ufw-skip-to-policy-input  tcp  --  anywhere             anywhere             tcp dpt:netbios-ssn
      ufw-skip-to-policy-input  tcp  --  anywhere             anywhere             tcp dpt:microsoft-ds
      ufw-skip-to-policy-input  udp  --  anywhere             anywhere             udp dpt:bootps
      ufw-skip-to-policy-input  udp  --  anywhere             anywhere             udp dpt:bootpc
      ufw-skip-to-policy-input  all  --  anywhere             anywhere             ADDRTYPE match dst-type BROADCAST
      
      Chain ufw-after-logging-forward (1 references)
      target     prot opt source               destination         
      LOG        all  --  anywhere             anywhere             limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
      
      Chain ufw-after-logging-input (1 references)
      target     prot opt source               destination         
      LOG        all  --  anywhere             anywhere             limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
      
      Chain ufw-after-logging-output (1 references)
      target     prot opt source               destination         
      
      Chain ufw-after-output (1 references)
      target     prot opt source               destination         
      
      Chain ufw-before-forward (1 references)
      target     prot opt source               destination         
      ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
      ACCEPT     icmp --  anywhere             anywhere             icmp destination-unreachable
      ACCEPT     icmp --  anywhere             anywhere             icmp source-quench
      ACCEPT     icmp --  anywhere             anywhere             icmp time-exceeded
      ACCEPT     icmp --  anywhere             anywhere             icmp parameter-problem
      ACCEPT     icmp --  anywhere             anywhere             icmp echo-request
      ufw-user-forward  all  --  anywhere             anywhere            
      
      Chain ufw-before-input (1 references)
      target     prot opt source               destination         
      ACCEPT     all  --  anywhere             anywhere            
      ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
      ufw-logging-deny  all  --  anywhere             anywhere             ctstate INVALID
      DROP       all  --  anywhere             anywhere             ctstate INVALID
      ACCEPT     icmp --  anywhere             anywhere             icmp destination-unreachable
      ACCEPT     icmp --  anywhere             anywhere             icmp source-quench
      ACCEPT     icmp --  anywhere             anywhere             icmp time-exceeded
      ACCEPT     icmp --  anywhere             anywhere             icmp parameter-problem
      ACCEPT     icmp --  anywhere             anywhere             icmp echo-request
      ACCEPT     udp  --  anywhere             anywhere             udp spt:bootps dpt:bootpc
      ufw-not-local  all  --  anywhere             anywhere            
      ACCEPT     udp  --  anywhere             224.0.0.251          udp dpt:mdns
      ACCEPT     udp  --  anywhere             239.255.255.250      udp dpt:1900
      ufw-user-input  all  --  anywhere             anywhere            
      
      Chain ufw-before-logging-forward (1 references)
      target     prot opt source               destination         
      
      Chain ufw-before-logging-input (1 references)
      target     prot opt source               destination         
      
      Chain ufw-before-logging-output (1 references)
      target     prot opt source               destination         
      
      Chain ufw-before-output (1 references)
      target     prot opt source               destination         
      ACCEPT     all  --  anywhere             anywhere            
      ACCEPT     all  --  anywhere             anywhere             ctstate RELATED,ESTABLISHED
      ufw-user-output  all  --  anywhere             anywhere            
      
      Chain ufw-logging-allow (0 references)
      target     prot opt source               destination         
      LOG        all  --  anywhere             anywhere             limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "
      
      Chain ufw-logging-deny (2 references)
      target     prot opt source               destination         
      RETURN     all  --  anywhere             anywhere             ctstate INVALID limit: avg 3/min burst 10
      LOG        all  --  anywhere             anywhere             limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
      
      Chain ufw-not-local (1 references)
      target     prot opt source               destination         
      RETURN     all  --  anywhere             anywhere             ADDRTYPE match dst-type LOCAL
      RETURN     all  --  anywhere             anywhere             ADDRTYPE match dst-type MULTICAST
      RETURN     all  --  anywhere             anywhere             ADDRTYPE match dst-type BROADCAST
      ufw-logging-deny  all  --  anywhere             anywhere             limit: avg 3/min burst 10
      DROP       all  --  anywhere             anywhere            
      
      Chain ufw-reject-forward (1 references)
      target     prot opt source               destination         
      
      Chain ufw-reject-input (1 references)
      target     prot opt source               destination         
      
      Chain ufw-reject-output (1 references)
      target     prot opt source               destination         
      
      Chain ufw-skip-to-policy-forward (0 references)
      target     prot opt source               destination         
      DROP       all  --  anywhere             anywhere            
      
      Chain ufw-skip-to-policy-input (7 references)
      target     prot opt source               destination         
      DROP       all  --  anywhere             anywhere            
      
      Chain ufw-skip-to-policy-output (0 references)
      target     prot opt source               destination         
      ACCEPT     all  --  anywhere             anywhere            
      
      Chain ufw-track-forward (1 references)
      target     prot opt source               destination         
      
      Chain ufw-track-input (1 references)
      target     prot opt source               destination         
      
      Chain ufw-track-output (1 references)
      target     prot opt source               destination         
      ACCEPT     tcp  --  anywhere             anywhere             ctstate NEW
      ACCEPT     udp  --  anywhere             anywhere             ctstate NEW
      
      Chain ufw-user-forward (1 references)
      target     prot opt source               destination         
      
      Chain ufw-user-input (1 references)
      target     prot opt source               destination         
      
      Chain ufw-user-limit (0 references)
      target     prot opt source               destination         
      LOG        all  --  anywhere             anywhere             limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
      REJECT     all  --  anywhere             anywhere             reject-with icmp-port-unreachable
      
      Chain ufw-user-limit-accept (0 references)
      target     prot opt source               destination         
      ACCEPT     all  --  anywhere             anywhere            
      
      Chain ufw-user-logging-forward (0 references)
      target     prot opt source               destination         
      
      Chain ufw-user-logging-input (0 references)
      target     prot opt source               destination         
      
      Chain ufw-user-logging-output (0 references)
      target     prot opt source               destination         
      
      Chain ufw-user-output (1 references)
      target     prot opt source               destination         
      user@antix1:~
      $ 
      

      Thanks

      Dell Latitude D620 laptop with antiX 22 (64 bit)

      #28644
      Forum Admin
      anticapitalista
        Helpful
        Up
        0
        ::

        In my opinion, if you have a router, there is no real need for another (software) firewall like (g)ufw since it is just a front end to iptables (already set up by default). Others, I’m sure will differ.

        Philosophers have interpreted the world in many ways; the point is to change it.

        antiX with runit - leaner and meaner.

        #28654
        Member
        greyowl
          Helpful
          Up
          0
          ::

          Thanks for the advice.
          I do have a router so I will dispense with ufw.

          Dell Latitude D620 laptop with antiX 22 (64 bit)

          #28656
          Member
          wildstar84
            Helpful
            Up
            0
            ::

            I have a router too, but often thought about setting up a firewall I could use when using, say “coffeeshop/hotel wifi” for security, but have never bothered to go to the trouble to figure out how, so still could be useful.

            #28658
            Forum Admin
            anticapitalista
              Helpful
              Up
              0
              ::

              @ wildstar – Good point
              I assume the already set iptables is good enough without any need for additional manual firewall changes.
              But I’m no expert.

              Philosophers have interpreted the world in many ways; the point is to change it.

              antiX with runit - leaner and meaner.

            Viewing 5 posts - 1 through 5 (of 5 total)
            • You must be logged in to reply to this topic.